Click here to download all references as Bib-File.•
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire |
2013-09-11
⋅
Kaspersky Labs
⋅
The “Kimsuky” Operation: A North Korean APT? Kimsuky |
2013-09-09
⋅
ESET Research
⋅
HESPERBOT A New, Advanced Banking Trojan in the Wild HesperBot |
2013-09-06
⋅
FireEye
⋅
Evasive Tactics: Taidoor taidoor Taleret |
2013-09-05
⋅
Fox-IT
⋅
Large botnet cause of recent Tor network overload Mevade |
2013-09-04
⋅
Trend Micro
⋅
Sykipot Now Targeting US Civil Aviation Sector Information APT4 |
2013-09-04
⋅
Trend Micro
⋅
Sykipot Now Targeting US Civil Aviation Sector Information sykipot |
2013-09-01
⋅
Eternal Todo
⋅
Yet another Andromeda / Gamarue analysis Andromeda |
2013-08-27
⋅
Avast
⋅
Linux Trojan “Hand of Thief” ungloved Hand of Thief |
2013-08-25
⋅
AusCERT
⋅
The Compromised Devices of the Carna Botnet |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-14
⋅
VirusTotal
⋅
VT Report for a sample GSpy |
2013-08-13
⋅
KrebsOnSecurity
⋅
Inside a ‘Reveton’ Ransomware Operation Reveton |
2013-08-13
⋅
MalwareTech
⋅
PowerLoader Injection – Something truly amazing PowerLoader |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-08-12
⋅
ContagioExchange
⋅
Taleret strings - APT (1) Taleret |
2013-08-07
⋅
RSA
⋅
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD Hand of Thief |
2013-08-07
⋅
FireEye
⋅
Breaking Down the China Chopper Web Shell - Part I CHINACHOPPER |
2013-08-02
⋅
CitizenLab
⋅
Surtr Malware Family Targeting the Tibetan Community surtr |